Compliance with bring your own device security policies in organizations: A systematic literature review

The omnipresence of Bring Your Own Device (BYOD) in organizations and employees' lives makes it a challenge to ensure adherence to security policy. In such situation, it is vital to understand the features of BYOD that impact the threat landscape, as well as identifying factors that contribute...

Full description

Saved in:
Bibliographic Details
Main Authors: Palanisamy, Rathika, Norman, Azah Anir, Kiah, Miss Laiha Mat
Format: Article
Published: Elsevier 2020
Subjects:
Online Access:http://eprints.um.edu.my/36310/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.um.eprints.36310
record_format eprints
spelling my.um.eprints.363102023-10-06T00:50:17Z http://eprints.um.edu.my/36310/ Compliance with bring your own device security policies in organizations: A systematic literature review Palanisamy, Rathika Norman, Azah Anir Kiah, Miss Laiha Mat QA75 Electronic computers. Computer science The omnipresence of Bring Your Own Device (BYOD) in organizations and employees' lives makes it a challenge to ensure adherence to security policy. In such situation, it is vital to understand the features of BYOD that impact the threat landscape, as well as identifying factors that contribute to security policy compliant behavior to create a secure environment in organizations. Though research on BYOD has progressed, the field still lacks a systematic literature analysis, as previous reviews have focused on traditional computing security policy compliance, leaving out the BYOD environment. A total of 21 articles published from 2012 to 2019 were reviewed systematically to answer a formulated set of research questions. The study reveals the unique features of the BYOD computing environment in organizations. This review provides an overview of the theories used to explain and predict security behaviors in this field and a detailed understanding of factors that influence BYOD security policy compliance behavior. Literature gaps for further research are proposed in this paper to present new insights in this field of research. Studies on BYOD security policy compliance remain scarce, which makes this review a novel contribution to human security behavioral studies. (c) 2020 Elsevier Ltd. All rights reserved. Elsevier 2020-11 Article PeerReviewed Palanisamy, Rathika and Norman, Azah Anir and Kiah, Miss Laiha Mat (2020) Compliance with bring your own device security policies in organizations: A systematic literature review. Computers & Security, 98. ISSN 0167-4048, DOI https://doi.org/10.1016/j.cose.2020.101998 <https://doi.org/10.1016/j.cose.2020.101998>. 10.1016/j.cose.2020.101998
institution Universiti Malaya
building UM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaya
content_source UM Research Repository
url_provider http://eprints.um.edu.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Palanisamy, Rathika
Norman, Azah Anir
Kiah, Miss Laiha Mat
Compliance with bring your own device security policies in organizations: A systematic literature review
description The omnipresence of Bring Your Own Device (BYOD) in organizations and employees' lives makes it a challenge to ensure adherence to security policy. In such situation, it is vital to understand the features of BYOD that impact the threat landscape, as well as identifying factors that contribute to security policy compliant behavior to create a secure environment in organizations. Though research on BYOD has progressed, the field still lacks a systematic literature analysis, as previous reviews have focused on traditional computing security policy compliance, leaving out the BYOD environment. A total of 21 articles published from 2012 to 2019 were reviewed systematically to answer a formulated set of research questions. The study reveals the unique features of the BYOD computing environment in organizations. This review provides an overview of the theories used to explain and predict security behaviors in this field and a detailed understanding of factors that influence BYOD security policy compliance behavior. Literature gaps for further research are proposed in this paper to present new insights in this field of research. Studies on BYOD security policy compliance remain scarce, which makes this review a novel contribution to human security behavioral studies. (c) 2020 Elsevier Ltd. All rights reserved.
format Article
author Palanisamy, Rathika
Norman, Azah Anir
Kiah, Miss Laiha Mat
author_facet Palanisamy, Rathika
Norman, Azah Anir
Kiah, Miss Laiha Mat
author_sort Palanisamy, Rathika
title Compliance with bring your own device security policies in organizations: A systematic literature review
title_short Compliance with bring your own device security policies in organizations: A systematic literature review
title_full Compliance with bring your own device security policies in organizations: A systematic literature review
title_fullStr Compliance with bring your own device security policies in organizations: A systematic literature review
title_full_unstemmed Compliance with bring your own device security policies in organizations: A systematic literature review
title_sort compliance with bring your own device security policies in organizations: a systematic literature review
publisher Elsevier
publishDate 2020
url http://eprints.um.edu.my/36310/
_version_ 1781704494395949056
score 13.160551